Network Synergy Blog

Why You Need to Be Certain You’re Using Licensed Software

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

To begin, we want to say that we feel that nobody should use pirated software. However, while we don’t condone software piracy, we also can’t say we’re comfortable with the tactics that are used to combat this piracy, either. This is especially true when we consider the kinds of activities that BSA | The Software Alliance, engages in.

A Bit of Background
BSA is an international advocacy group for the proper licensing of business-centric software solutions, with a member list that includes IBM, Apple, Microsoft, Adobe, Trend Micro, and many others. The organization, according to their website, “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

This would be all well and good, if it weren’t for the tactics that BSA has used in the past to accomplish their other goal. Pirated software is BSA’s main target, and they work to make any business found with any unlicensed software installed pay, and pay a lot.

Their Preferred Tactic: Bribery and Social Media Guerilla Marketing
BSA has a history of targeting businesses under suspicion of having unlicensed software in use. However, in order to catch these businesses in the act, BSA targets their employees.

BSA has a history of leveraging social media marketing to target the employees of companies directly. These ads have promised a cash bounty in exchange for turning in their employer for software piracy. A now-seemingly-defunct Facebook page for a campaign run by BSA would entice users to turn in businesses in exchange for a cash reward.

However, who would know if a business was using unlicensed software better than one of that business’ employees?

BSA seems to have known this from the start, running ads that read “Nail your boss. Report Software Piracy” before taking a more subliminal, covert approach through targeted social media efforts. These efforts are targeted towards those whom you have employed, and attempt to sway them into blowing the whistle on you for software piracy by offering a bounty.

These bounties are scaled to the value of the settlement that the reported company has to pay BSA. If the company had to pay anywhere between $15,000 to $100,000, the whistleblower could receive up to $5,000. If the company had to pay over $15,000,000, the reward could swell to a $1,000,000 payout. However, BSA “reserves the right to deviate from that schedule in its sole discretion.”

Or, in other words, pay less of a bounty while still collecting retribution from the company.

Why You May Have a Problem
Unfortunately, there are plenty of ways that you could be left on the hook if BSA were to ever come knocking on your door, and many of them are completely due to your employees. For instance, if you’re caught with unlicensed software installed on your system, you’re the one responsible, not the employee who installed it.
The same is true if an employee installs the same software license on multiple devices. If that employee were to leave with bad blood, they could report you for it, even though they were responsible for it being on your systems.

How to Solve the Problem
You need to be sure that you have no unlicensed software anywhere on your network. Running an audit is a simple way to identify and dispose of any software that might trip you up with BSA, allowing you to solve the problem before dealing with the circumstances that come from actions done without your approval.
Network Synergy can help you run this audit, and deal with any software that doesn’t meet the requirements set by BSA. Call us at 203.261.2201 to ensure your business is protected.

How to Keep IT and the Rest of Your Staff on the S...
Tip of the Week: Putting Your Old Android Device t...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 19, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Enterprise Content Management SharePoint Food Virtual Reality Wires Data Breach Deep Learning Holiday IT Technicians Privacy Undo YouTube Mobile Data Virtual Private Network Emoji Knowledge Gmail Phishing Computer Care Touchscreen Value Fleet Tracking IT Consulting Service-based Business Cybercrime Battery LinkedIn Streaming Media Modem Error Motherboard Techology Screen Reader Social Media Google Gadgets Tech Term Cables Information Backups The Internet of Things Technology Laws Miscellaneous Office 365 Network Management Encryption Redundancy Scheduling HIPAA Managed IT Service Save Money Outlook Health Solid State Drive Law Firm IT Vulnerabilities File Sharing Maintenance Excel Drones Innovation Downtime Software as a Service Windows 10 iPhone Going Green Cortana Remote Workers Text Messaging Experience Heating/Cooling Distributed Denial of Service CrashOverride Cloud Computing Augmented Reality Social Engineering Wireless Technology Efficiency Tip of the Work Chromebook PC Care Cabling Network Security Disaster Recovery Troubleshooting Alert IT Support Bluetooth GPS BYOD Chrome Cooperation Fraud Halloween Regulation Law Enforcement Operations Mobile Devices Staffing Unsupported Software Automation Company Culture Mobile Office Mobile Security Managed IT services Mobility Virus Cost Management Twitter Wearable Technology Data Recovery Remote Monitoring and Management How To Facebook Trending Geography Display Identity Theft Printing Unified Threat Management Relocation eBay Print Server Google Calendar Co-managed IT Piracy Disaster Resistance eWaste Google Drive Hacker Leadership Budget Risk Management Internet of Things Lenovo Fax Server Tip of the Week Mirgation Recovery communications Software Tips IT service End of Support VoIP IBM Mobile Business Intelligence Lithium-ion Battery Public Cloud Network Communication Processors Data Management Secruity IT Consultant Memory Alerts Migration Malware Windows 8.1 Update Data Disaster Webcam Website Artificial Intelligence Best Available Customer Service Business Continuity Workplace Tips Hiring/Firing Work Station Cache Staff Remote Computing Botnet LiFi Managed Service Search Google Wallet Computing Infrastructure How To Multi-Factor Security Vendor Management User Information Technology Analyitcs Business PowerPoint Work/Life Balance Administrator Sync Blockchain Google Docs Smartphones Compliance App Hacking MSP Competition Business Computing Data Loss OneNote Tablet Cybersecurity Bandwidth Start Menu Network Congestion Cameras Cleaning Permissions Specifications Utility Computing Black Friday Public Speaking Saving Money Training Samsung Browser Chatbots Automobile Development Help Desk Smart Tech Paperless Office Documents Servers Business Growth User Error Content Filtering Digital Payment Software Passwords Digital Gaming Console Debate Patch Management Safety Internet IoT Upgrades Windows 8 Data Backup Password Saving Time Break Fix Google Maps 3D Android Microsoft Office WPA3 CCTV Scam Google Analytics Cyber Monday Net Neutrality Shortcut Best Practice Quick Tips Mobile Device CIO IT Services Mail Merge Hosted Solution Money Identity Statistics Cloud Identities Skype Networking Mobile Device Management Regulations Data storage Mouse Scary Stories IT Solutions Trainging Windows Server Management Meetings Avoiding Downtime Internet Exlporer Superfish Downloads Users Proactive IT Buisness Smartphone Tracking Operating System Project Management Office Tips Outsourced IT Taxes Social Politics Employer-Employee Relationship Two-factor Authentication Microsoft Word IT Support VPN Big Data Proactive User Tips Infrastructure Tip of the week Server Uninterrupted Power Supply Webinar Hard Drives Thank You Video Surveillance Application Hacks Managed Service Provider Retail Dark Web SaaS Point of Sale Crowdfunding G Suite Cryptocurrency PDF IT budget Ransomware Enterprise Resource Planning Entrepreneur Firewall Websites 5G Comparison Customer Relationship Management USB Computers Backup Mobile Technology Save Time People Security Office Legislation Microsoft Excel Hotspot Hard Drive Telephony Wireless Online Currency Language Virtual Desktop Presentation Monitors Productivity Alt Codes Computing Bitcoin Gadget Smart Technology Humor Wi-Fi Router Time Management Document Management Spam Upgrade Typing Phone System Programming Managed IT Services Flexibility Employee-Employer Relationship Licensing Productivity History WiFi Macro Education Spyware Domains Fun Firefox BDR Apps Conferencing Cookies Marketing Unified Communications Laptop Connectivity Business Management Hardware Windows 10 Printer Corporate Profile Electronic Medical Records Settings Computer Repair Private Cloud Managed IT Writing Files Unified Threat Management Telephone Systems Email Refrigeration Administration Data Security Healthcare Congratulations Access Control Personal Information Technology Asset Tracking Supercomputer Hard Disk Drive Government Vulnerability Social Networking Recycling Remote Support Managing Stress Address High-Speed Internet Technology Tips Consumers Apple Current Events Tutorials Charger Hackers Business Technology Physical Security Robot Best Practices Business Owner Sports Data Warehousing 3D Printing Intranet Inbound Marketing Mobile Computing Consultation Small Business Applications Machine Learning Assessment Web Server Environment Digital Signature Monitoring Legal Management Computer Accessories Hosted Solutions Notifications Collaboration Tech Support Bring Your Own Device Remote Monitoring IT Management Motion sickness Travel Computer Star Wars Virtualization Logs Crowdsourcing Storage Nanotechnology Black Market Running Cable IP Address Antivirus

      Latest Blogs

      Every business has some sort of management tasks that requires foresight, and staying up on them can keep headache-inducing situations from constantly causing downtime and costing ...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube